Brute force modules should be named service_login
This commit is contained in:
+1
-1
@@ -9,7 +9,7 @@ It allows to attack both regular user and admin as well - you can select which t
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. `use auxiliary/scanner/ivanti/login_scanner`
|
||||
1. `use auxiliary/scanner/ivanti/ivanti_login`
|
||||
2. `set RHOSTS [IP]`
|
||||
3. either `set USERNAME [username]` or `set USERPASS_FILE [usernames file]`
|
||||
4. either `set PASSWORD [password]` or `set PASS_FILE [passwords file]`
|
||||
+4
-1
@@ -9,13 +9,16 @@ class MetasploitModule < Msf::Auxiliary
|
||||
include Msf::Auxiliary::Scanner
|
||||
include Msf::Auxiliary::ReportSummary
|
||||
|
||||
include Msf::Exploit::Deprecated
|
||||
moved_from 'auxiliary/scanner/ivanti/login_scanner'
|
||||
|
||||
def initialize(info = {})
|
||||
super(
|
||||
update_info(
|
||||
info,
|
||||
'Name' => 'Ivanti Connect Secure HTTP Scanner',
|
||||
'Description' => %q{
|
||||
This module will perform authentication scanning against Ivanti Connect Secure
|
||||
This module will perform authentication scanning against Ivanti Connect Secure.
|
||||
},
|
||||
'Author' => ['msutovsky-r7'],
|
||||
'License' => MSF_LICENSE,
|
||||
Reference in New Issue
Block a user